Marko Horvat
Marko Horvat
Department of Mathematics, Faculty of Science, University of Zagreb
Verified email at
Cited by
Cited by
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication
C Cremers, M Horvat, S Scott, T van der Merwe
2016 IEEE Symposium on Security and Privacy (SP), 470-485, 2016
Testing cyber-physical systems through bayesian optimization
J Deshmukh, M Horvat, X Jin, R Majumdar, VS Prabhu
ACM Transactions on Embedded Computing Systems (TECS) 16 (5s), 1-18, 2017
Improving the ISO/IEC 11770 standard for key management techniques
C Cremers, M Horvat
International Journal of Information Security 15 (6), 659-673, 2016
Actor key compromise: Consequences and countermeasures
D Basin, C Cremers, M Horvat
2014 IEEE 27th Computer Security Foundations Symposium, 244-258, 2014
Computability of pseudo-cubes
M Horvat, Z Iljazović, B Pažek
Annals of Pure and Applied Logic 171 (8), 102823, 2020
Computable subcontinua of semicomputable chainable Hausdorff continua
V Čačić, M Horvat, Z Iljazović
Theoretical Computer Science 892, 155-169, 2021
Formal analysis of modern security protocols in current standards
M Horvat
University of Oxford, 2015
Formal Security Analysis of the AMD SEV-SNP Software Interface
P Paradžik, A Derek, M Horvat
arXiv preprint arXiv:2403.10296, 2024
Rearranging absolutely convergent well-ordered series in Banach spaces
V Čačić, M Doko, M Horvat
Rad Hrvatske akademije znanosti i umjetnosti: Matematičke znanosti, 1-11, 2019
The system can't perform the operation now. Try again later.
Articles 1–10